Security Information & Event Management, or SIEM (pronounced "sim," with a silent "e"), is gaining a reputation outside of the cybersecurity community. Advertisements on YouTube and Hulu tout the product’s incomparable security and real-time effectiveness, but they struggle to convey what a SIEM really does. Technical security lingo tends to make non-technical people tune out, and trying to simplify the concept diminishes its value.
Cybercrime and cybersecurity are intimidating concepts, and with so many different services and methods of protection available, it is hard to know where to start! Keep in mind, the best cybersecurity program is the one that serves your needs and protects your organization. You should invest in protection that is uniquely suited to the size, maturity, industry, and compliance standards of your business. . . or you can pick something based on your astrological sign!
Just like you, a good cybersecurity program should be strong, useful, and constantly evolving to meet new challenges. Find your sign below to learn how you can start protecting your online privacy and digital information.
Aquarius (Jan 20-Feb 18) – The Aquarius sign tends to be intellectual and progressive, with a strong desire for community. Given these traits, an Aquarius may be the perfect person to manage your organization’s security awareness training for employees! Your end-users are your first line of security defense, and their proactive education will inevitably serve your organization. There are several styles of security awareness training, from automated phishing campaigns to interactive, gamified training like an escape room exercise. Digital products, like KnowBe4, aim to reduce the risk of human error by exposing your employees to the types of attacks that would potentially compromise their information. KnowBe4 and similar services offer training modules to ensure your entire staff knows how to identify and avoid the most common cyber threats.
As a non-technical person working in the cybersecurity industry, I often find myself asking, “Do I need to be worried about [insert novel threat]?” I am almost always pleased to learn that the experts have considered these threats and created simple protective measures so that no, I do not necessarily need to be worried about [insert novel threat]. In taking a few simple precautions, you might never need to worry about these intimidating cyber risks ever again!
If you were going to test the fault-points of a building, you wouldn’t hire the architect, you’d hire a demolitions expert. Similarly, you don’t want the designer of your network testing its security. If the team that configures your network does so incorrectly, they are most likely unaware. The creator of the environment has an inherent bias based on the angle from which they view it. They are blind to vulnerabilities, not necessarily because they are under-qualified, but because they are too close to the project. A security team has a “black box perspective”, which means they have the same outside view of the system that an attacker would. This outsider point of view is just one of the advantages a security expert has over an internal IT team. They also have the training, experience, time, and resources that would be impossible to lump in with a standard IT program.